<aside> ⚠️
CLICK DUPLICATE BUTTON TO START USING THE TEMPLATE
</aside>
<aside> 🎯
Objective: Evaluate your organization's resilience against supply chain attacks by simulating how attackers can compromise trusted third-party relationships to bypass your security controls and gain access to systems and data.
</aside>
Select the most appropriate attack vectors based on your organization's vendor ecosystem:
Attack Vector | Complexity | Detection Difficulty | Impact Potential | Best For |
---|---|---|---|---|
Vendor Account Compromise | Medium | High | Very High | Testing vendor access controls |
Software Dependency Attack | High | Very High | Critical | Testing software delivery pipeline |
Update Infrastructure Compromise | High | High | Critical | Testing patch management process |
Third-Party API/Service Attack | Medium | Medium | High | Testing integrated services |
Vendor Network Compromise | High | Medium | High | Testing network trust relationships |
Hardware/Firmware Supply Chain | Very High | Very High | Critical | Advanced security programs |
Target Type | Risk Level | Value for Assessment | Selection Criteria |
---|---|---|---|
Critical Vendors | High | Very High | Vendors with admin access or critical data access |
SaaS Providers | Medium-High | High | Cloud services with sensitive data or wide access |
Software Providers | Medium | High | Applications used in critical business processes |
Development Dependencies | Medium | Medium-High | Libraries, frameworks used in internal applications |
Managed Service Providers | High | Very High | Providers with privileged network/system access |
Hardware/Device Vendors | Medium | Medium | Device firmware, IoT, or specialized hardware |
Boundary Type | Description | Example Constraints |
---|---|---|
Simulation Boundaries | Which attacks to simulate vs. emulate | No actual vendor compromise, simulate with authorized access |
Target Boundaries | Which vendors/services in scope | Only top 5 critical vendors by risk assessment |
Technical Boundaries | Technical limits on testing | No destruction of data, no actual malware deployment |
Notification Boundaries | Who is aware of the exercise | Notify security team but not vendor management team |
Time Boundaries | When testing can occur | Business hours only, specific testing window |